Skip to content
Kevin Wells
Menu
HOME
Skills & Experience
Current Threats & Trends
Articles
Identity & Access Management (IAM)
Secure access with SSH keys, sudo, PAM, and cloud IAM roles.
Automation & Monitoring
Streamline operations with Ansible workflows, logging pipelines, and proactive monitoring.
Backups & DR
Protect data and maintain continuity with resilient backup and recovery strategies.
Cloud Security
Defend AWS and hybrid environments with strong identity, policy, and monitoring controls.
AI Security
Practical security engineering for LLMs and autonomous agents – risks, controls, architectures, and incident playbooks.
System Hardening
Secure Linux systems through patching, CIS benchmarks, and OS lockdown.
Tools & Cheatsheets
Practical quick-reference guides for Linux and cloud security administrators.
Lab Projects
Resources
About
Contact
Nothing Found
It seems we can’t find what you’re looking for. Perhaps searching can help.
Search for: